First published: Thu Apr 29 2021(Updated: )
NVIDIA vGPU software contains a vulnerability in the guest kernel mode driver and Virtual GPU Manager (vGPU plugin), in which an input length is not validated, which may lead to information disclosure, tampering of data, or denial of service. This affects vGPU version 12.x (prior to 12.2) and version 11.x (prior to 11.4).
Credit: psirt@nvidia.com psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
NVIDIA Virtual GPU Manager | >=11.0<11.4 | |
NVIDIA Virtual GPU Manager | >=12.0<12.2 | |
Citrix Hypervisor | ||
Linux Linux kernel | ||
Microsoft Windows | ||
Redhat Enterprise Linux Kernel-based Virtual Machine | ||
VMware vSphere |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-1083.
The severity of CVE-2021-1083 is high with a CVSS score of 7.8.
The NVIDIA vGPU software versions 12.x (prior to 12.2) and versions 11.0 to 11.4 are affected.
This vulnerability may lead to information disclosure, tampering of data, or denial of service.
You can find more information about the vulnerability on the NVIDIA customer help website: https://nvidia.custhelp.com/app/answers/detail/a_id/5172